US7574740B1
(en)
*
|
2000-04-28 |
2009-08-11 |
International Business Machines Corporation |
Method and system for intrusion detection in a computer network
|
US7185232B1
(en)
*
|
2001-02-28 |
2007-02-27 |
Cenzic, Inc. |
Fault injection methods and apparatus
|
US8788650B1
(en)
*
|
2002-07-19 |
2014-07-22 |
Fortinet, Inc. |
Hardware based detection devices for detecting network traffic content and methods of using the same
|
US8296847B2
(en)
*
|
2003-07-25 |
2012-10-23 |
Hewlett-Packard Development Company, L.P. |
Method of managing utilization of network intrusion detection systems in a dynamic data center
|
EP1704492A1
(en)
|
2003-11-27 |
2006-09-27 |
Quinetiq Limited |
Automated anomaly detection
|
US20050193429A1
(en)
*
|
2004-01-23 |
2005-09-01 |
The Barrier Group |
Integrated data traffic monitoring system
|
US20050278178A1
(en)
*
|
2004-06-10 |
2005-12-15 |
International Business Machines Corporation |
System and method for intrusion decision-making in autonomic computing environments
|
CN100372296C
(en)
*
|
2004-07-16 |
2008-02-27 |
北京航空航天大学 |
Network invading detection system with two-level decision structure and its alarm optimization method
|
US20060075481A1
(en)
*
|
2004-09-28 |
2006-04-06 |
Ross Alan D |
System, method and device for intrusion prevention
|
US7650640B1
(en)
*
|
2004-10-18 |
2010-01-19 |
Symantec Corporation |
Method and system for detecting IA32 targeted buffer overflow attacks
|
CA2594020C
(en)
*
|
2004-12-22 |
2014-12-09 |
Wake Forest University |
Method, systems, and computer program products for implementing function-parallel network firewall
|
US8042167B2
(en)
*
|
2005-03-28 |
2011-10-18 |
Wake Forest University |
Methods, systems, and computer program products for network firewall policy optimization
|
US7983900B2
(en)
|
2006-02-08 |
2011-07-19 |
Oracle International Corporation |
Method, computer program and apparatus for analysing symbols in a computer system
|
US8443443B2
(en)
|
2006-10-04 |
2013-05-14 |
Behaviometrics Ab |
Security system and method for detecting intrusion in a computerized system
|
CN100440811C
(en)
*
|
2006-12-25 |
2008-12-03 |
杭州华三通信技术有限公司 |
Detection method and device for network attack
|
US8510467B2
(en)
*
|
2007-01-11 |
2013-08-13 |
Ept Innovation |
Monitoring a message associated with an action
|
US8413247B2
(en)
*
|
2007-03-14 |
2013-04-02 |
Microsoft Corporation |
Adaptive data collection for root-cause analysis and intrusion detection
|
US8955105B2
(en)
*
|
2007-03-14 |
2015-02-10 |
Microsoft Corporation |
Endpoint enabled for enterprise security assessment sharing
|
US8959568B2
(en)
*
|
2007-03-14 |
2015-02-17 |
Microsoft Corporation |
Enterprise security assessment sharing
|
US20080229419A1
(en)
*
|
2007-03-16 |
2008-09-18 |
Microsoft Corporation |
Automated identification of firewall malware scanner deficiencies
|
US8424094B2
(en)
*
|
2007-04-02 |
2013-04-16 |
Microsoft Corporation |
Automated collection of forensic evidence associated with a network security incident
|
EP2023572B1
(en)
|
2007-08-08 |
2017-12-06 |
Oracle International Corporation |
Method, computer program and apparatus for controlling access to a computer resource and obtaining a baseline therefor
|
US9389839B2
(en)
|
2008-06-26 |
2016-07-12 |
Microsoft Technology Licensing, Llc |
Safe code for signature updates in an intrusion prevention system
|
US8490171B2
(en)
*
|
2008-07-14 |
2013-07-16 |
Tufin Software Technologies Ltd. |
Method of configuring a security gateway and system thereof
|
CA2674327C
(en)
*
|
2008-08-06 |
2017-01-03 |
Trend Micro Incorporated |
Exploit nonspecific host intrusion prevention/detection methods and systems and smart filters therefor
|
US8904530B2
(en)
*
|
2008-12-22 |
2014-12-02 |
At&T Intellectual Property I, L.P. |
System and method for detecting remotely controlled E-mail spam hosts
|
US8825473B2
(en)
|
2009-01-20 |
2014-09-02 |
Oracle International Corporation |
Method, computer program and apparatus for analyzing symbols in a computer system
|
US8490187B2
(en)
|
2009-03-20 |
2013-07-16 |
Microsoft Corporation |
Controlling malicious activity detection using behavioral models
|
US8495725B2
(en)
*
|
2009-08-28 |
2013-07-23 |
Great Wall Systems |
Methods, systems, and computer readable media for adaptive packet filtering
|
US8666731B2
(en)
|
2009-09-22 |
2014-03-04 |
Oracle International Corporation |
Method, a computer program and apparatus for processing a computer message
|
US8145948B2
(en)
*
|
2009-10-30 |
2012-03-27 |
International Business Machines Corporation |
Governance in work flow software
|
US8800036B2
(en)
*
|
2010-01-22 |
2014-08-05 |
The School Of Electrical Engineering And Computer Science (Seecs), National University Of Sciences And Technology (Nust) |
Method and system for adaptive anomaly-based intrusion detection
|
US9058492B1
(en)
*
|
2011-02-14 |
2015-06-16 |
Symantec Corporation |
Techniques for reducing executable code vulnerability
|
US9565213B2
(en)
|
2012-10-22 |
2017-02-07 |
Centripetal Networks, Inc. |
Methods and systems for protecting a secured network
|
US9137205B2
(en)
|
2012-10-22 |
2015-09-15 |
Centripetal Networks, Inc. |
Methods and systems for protecting a secured network
|
US9203806B2
(en)
|
2013-01-11 |
2015-12-01 |
Centripetal Networks, Inc. |
Rule swapping in a packet network
|
US9124552B2
(en)
|
2013-03-12 |
2015-09-01 |
Centripetal Networks, Inc. |
Filtering network data transfers
|
US9094445B2
(en)
|
2013-03-15 |
2015-07-28 |
Centripetal Networks, Inc. |
Protecting networks from cyber attacks and overloading
|
US9264370B1
(en)
|
2015-02-10 |
2016-02-16 |
Centripetal Networks, Inc. |
Correlating packets in communications networks
|
US9866576B2
(en)
|
2015-04-17 |
2018-01-09 |
Centripetal Networks, Inc. |
Rule-based network-threat detection
|
WO2017014823A2
(en)
*
|
2015-05-04 |
2017-01-26 |
Hasan Syed Kamran |
Method and device for managing security in a computer network
|
US9838354B1
(en)
*
|
2015-06-26 |
2017-12-05 |
Juniper Networks, Inc. |
Predicting firewall rule ranking value
|
CN105429963B
(en)
*
|
2015-11-04 |
2019-01-22 |
北京工业大学 |
Intrusion detection analysis method based on Modbus/Tcp
|
US9917856B2
(en)
|
2015-12-23 |
2018-03-13 |
Centripetal Networks, Inc. |
Rule-based network-threat detection for encrypted communications
|
US11729144B2
(en)
|
2016-01-04 |
2023-08-15 |
Centripetal Networks, Llc |
Efficient packet capture for cyber threat analysis
|
JP6750674B2
(en)
*
|
2016-04-26 |
2020-09-02 |
日本電気株式会社 |
Program analysis system, program analysis method, and computer program
|
US10990677B2
(en)
*
|
2017-06-05 |
2021-04-27 |
Microsoft Technology Licensing, Llc |
Adversarial quantum machine learning
|
US10503899B2
(en)
|
2017-07-10 |
2019-12-10 |
Centripetal Networks, Inc. |
Cyberanalysis workflow acceleration
|
US11233777B2
(en)
|
2017-07-24 |
2022-01-25 |
Centripetal Networks, Inc. |
Efficient SSL/TLS proxy
|
US10284526B2
(en)
|
2017-07-24 |
2019-05-07 |
Centripetal Networks, Inc. |
Efficient SSL/TLS proxy
|
US10333898B1
(en)
|
2018-07-09 |
2019-06-25 |
Centripetal Networks, Inc. |
Methods and systems for efficient network protection
|
US10902207B2
(en)
|
2018-09-13 |
2021-01-26 |
International Business Machines Corporation |
Identifying application software performance problems using automated content-based semantic monitoring
|
US11374944B2
(en)
|
2018-12-19 |
2022-06-28 |
Cisco Technology, Inc. |
Instant network threat detection system
|
CN111310162B
(en)
*
|
2020-01-20 |
2023-12-26 |
深圳力维智联技术有限公司 |
Trusted computing-based equipment access control method, device, product and medium
|
US11362996B2
(en)
|
2020-10-27 |
2022-06-14 |
Centripetal Networks, Inc. |
Methods and systems for efficient adaptive logging of cyber threat incidents
|
US11159546B1
(en)
|
2021-04-20 |
2021-10-26 |
Centripetal Networks, Inc. |
Methods and systems for efficient threat context-aware packet filtering for network protection
|
FR3136294A1
(en)
|
2022-06-02 |
2023-12-08 |
Airbus Cybersecurity Sas |
Method for detecting and reporting the compromise of an electronic system of a vehicle, device and associated system
|
CN115174201B
(en)
*
|
2022-06-30 |
2023-08-01 |
北京安博通科技股份有限公司 |
Security rule management method and device based on screening tag
|